APN Permutations
Characterization of Permutations
Component Functions
An -function is a permutation if and only if all of its components Failed to parse (syntax error): {\displaystyle f_λ} for are balanced.
Autocorrelation Functions of the Directional Derivatives
For any boolean function , we denote by the following value related to the Fourier (or Walsh) transform of :
The characterization in terms of the component functions given above can be equivalently expressed as
for any Failed to parse (syntax error): {\displaystyle λ\in\mathbb{F}^*_{2^n}} .
Equivalently [1], is a permutation if and only if
for any .
Characterization of APN Permutations
Up to CCZ-equivalence, all of the APN permutations known so far belong to a few families, namely:[2]
1. APN monomial functions in odd dimension.
2. One infinite family of quadratic polynomials in dimension , with odd and .[3]
3. Dillon's permutation in dimension 6.[4]
4. Two sporadic quadratic APN permutations in dimension 9.[5]
On the component functions
Clearly we have that no component function can be of degree 1. (This result is true for general APN maps)
For even we have also that no component can be partially-bent[6]. This implies that, in even dimension, no component can be of degree 2.
Autocorrelation Functions of the Directional Derivatives
An -function is an APN permutation if and only if [1]
and
for any .
On APN Power Functions
For odd, all power APN functions and the known APN binomials are permutations. When is even, no APN function exists in a class of permutations including power permutations.
Specifically:
If a power function over is APN, then for every we have if and only if , that is,
If is odd, then and, if is even, then .
Consequently, APN power functions are permutations if is odd, and are three-to-one over if is even.[7]
APN Permutations and Codes
The (Hamming) weight of any vector is denoted by , and the (Hamming) distance between any two vectors and from is denoted by . Any linear subspace of of dimension is called a binary linear code of length and dimension and is denoted by , where is the minimum Hamming distance of .
Any linear code is associated with its dual code, denoted by and defined as
Let be a binary matrix. We say that a linear binary code of length is defined by the parity check matrix if where is the transposed matrix of .
Let be APN, with .
is CCZ-equivalent to an APN permutation if and only if is a double simplex code (i.e. , where are codes).[8]
An APN Permutation in Dimension 6
In his paper [9], Hou conjectured that APN permutations did not exist in even dimension. He proved the following theorem that covers the case of :
Let be a permutation polynomial with . Then:
1. If , then is not APN.
2. If , then is not APN.
The question of whether APN permutations exist in even dimension was a long-standing problem until, in 2009, Dillon presented an APN permutation (of algebraic degree and nonlinearity ) in dimension 6[4].
This function is CCZ-equivalent to the Kim function (where is a primitive element of ), whose associated code is therefore a double simplex code. It was used later in the cryptosystem Fides[10], which has been subsequently broken due to its weaknesses in the linear component.
Dillon's function is also EA-equivalent to an involution and it is studied further in the introduction of the butterfly construction[11]. Unfortunately, this construction does not allow obtaining APN permutations in more than six variables[12].
The Big Open APN Problem
The question of existence of APN permutations in even dimension remains open. There exist nonexistent results within the following classes:
1. Plateaued functions (when APN, they have bent components);
2. A class of functions including power functions;
3. Functions whose univariate representation coefficients lie in , or in for divisible by 4; [9]
4. Functions whose univariate representation coefficients satisfy ; [13]
5. Functions having at least one partially-bent component[6].
References
- ↑ 1.0 1.1 Thierry Berger, Anne Canteaut, Pascale Charpin, Yann Laigle-Chapuy, On Almost Perfect Nonlinear Functions Over GF(2^n), IEEE Transactions on Information Theory, 2006 Sep,52(9),4160-70
- ↑ Bartoli, D., Timpanella, M. On a conjecture on APN permutations. Cryptogr. Commun. 14, 925–931 (2022)
- ↑ Budaghyan, L., Carlet, C., Leander, G.: Two classes of quadratic APN binomials inequivalent to power functions. IEEE Trans. Inf. Theory 54(9), 4218–4229 (2008)
- ↑ 4.0 4.1 Browning, K., Dillon, J.F., McQuistan, M., Wolfe, A.J.: An APN permutation in dimension six. In: Post-proceedings of the 9-th International conference on Finite Fields and their applications, American Mathematical Society, vol. 518, pp. 33–42 (2010)
- ↑ Beierle, C., Leander, G.: New instances of quadratic APN functions, arXiv:2009.07204 (2020)
- ↑ 6.0 6.1 Marco Calderini, Massimiliano Sala, Irene Villa, A note on APN permutations in even dimension, Finite Fields and Their Applications, vol. 46, 1-16, 2017
- ↑ H. Dobbertin. Private Communication, 1998.
- ↑ Browning, K.A. & Dillon, J.F. & Kibler, R.E. & McQuistan, M.T.. (2009). APN polynomials and related codes. Journal of Combinatorics, Information & System Sciences. 34.
- ↑ 9.0 9.1 X.-D. Hou. Affinity of Permutations of . Proceedings of Workshop on Coding and Cryptography WCC 2003, pp. 273-280, 2003. Completed version in Discrete Applied Mathematics 154 (2), pp. 313-325, 2006.
- ↑ B. Bilgin, A. Bogdanov, M. Knezevic, F. Mendel and Q. Wang. Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. Proceedings of International Workshop Cryptographic Hardware and Embedded Systems CHES 2013, Lecture Notes in Computer Science 8086, pp. 142-158, 2013.
- ↑ L. Perrin, A. Udovenko, A. Biryukov. Cryptanalysis of a theorem: decomposing the only known solution to the big APN problem. Proceedings of CRYPTO 2016, Lecture Notes in Computer Science 9815, part II, pp. 93-122, 2016.
- ↑ L. Perrin, A. Canteaut, S. Tian. If a generalized butterfly is APN then it operates on 6 bits. Special Issue on Boolean Functions and Their Applications 2018, Cryptography and Communications 11 (6), pp. 1147-1164, 2019.
- ↑ A. Canteaut. Differential cryptanalysis of Feistel ciphers and differentially uniform mappings. Proceedings of Selected Areas on Cryptography, SAC 1997, pp. 172-184, 1997.